Category Archives: Authenticate

Feed The Machine! Learn How to Easily Generate Computer-Processable Results With Amped Authenticate

Dear Amped blog readers, welcome! This week’s tip is dedicated to a rather hidden feature of Amped Authenticate: the possibility to use TSV (Tab-Separated Values) as the output format for the Smart Report and Batch Processing tools, instead of the classical HTML format. All those thinking “why should we even care?!”, raise your hands! I see many of you! Keep reading to find out why this feature could be way more important than you think.

Continue reading

The Power of Amped Authenticate for Investigating CSE Cases

When we talk about Amped Authenticate, you may automatically think of its use in detecting forged and manipulated images such as those created using editing software to portray a different scenario or message from that of the original purpose of the image, and you’re certainly right about that (particularly in the age of the ever-prevalent ‘fake news’). The great thing about Amped Authenticate is that it’s also so much more on top of forgery detection – identify image processing history from capture to publish, extract images from documents, provide camera ballistics, but, in my view most importantly, add more weight to your child sexual exploitation, or CSE, investigations with all these tools  and ultimately safeguard vulnerable children.

I always think of Authenticate as the tool I wish I’d had during my time examining mobile devices and computers, now realizing its potential to further solidify my cases and digital evidence, least of all because of the seamless integration with Griffeye Analyze. As digital forensics investigators, the majority of our work involves CSE material and recovering evidence from a multitude of devices to prove or disprove the offense in question, and the more evidence we can provide the more likely we are to achieve a successful prosecution or clear an innocent party – we keep an open and unbiased mind as forensics professionals, as always. 

The PRNU, or photo response non-uniformity (also known as camera ballistics), capabilities of Authenticate are often under-utilized by law enforcement digital forensics professionals – I admit, I didn’t realize it had such a tool and how useful it could be in my work at the start of my career! Let’s take a safeguarding investigation as an example, often unpleasant cases in which a child has been exploited. We know law enforcement and governments around the world have similar methods of tracking illegal images and videos, usually through databases, in order to identify such material quickly and to avoid unnecessary exposure of traumatic material to investigators, but these safeguarding cases often involve newly generated images, not stored in any database.

Continue reading

First Things First: Learn How a Proper Visual Inspection Can Guide Your Image Authentication on the Right Path!

Dear friends, thanks for coming here for this week’s Tip Tuesday! Today we are dealing with a basic feature of Amped Authenticate that often gets overlooked during our training courses, but it really shouldn’t be. I’m talking about the possibility of adjusting levels to get a better Visual Inspection of your evidence image. Keep reading and you’ll see how it can be useful.

Continue reading

Learning by Examples: You Have a Treasure in Your Amped Authenticate’s Samples Folder, Learn How to Make the Most of It

Dear Tip Tuesday aficionados, welcome to this brand new tip! Today we’re dealing with Amped Authenticate, the most complete software for image integrity and authenticity analysis you can find out there. If you installed the latest, recent update, you may have noticed that a lot of new features were added. But there’s one thing we worked on a whole lot and we really don’t want you to miss: the totally renewed and enriched Samples Folder. This tip will show you why that folder is definitely worth a look.

Continue reading

Check Them All! Learn How to Run Camera Identification Against Multiple Reference Devices in Batch with Amped Authenticate

Welcome, dear Amped blog friends! This week’s tip is dedicated to Amped Authenticate‘s Camera Identification filter, which received important upgrades with the last software release! Today we’ll see how you can check images against multiple cameras in batch, saving a lot of time!

Camera Identification is one of the core features in Amped Authenticate: it has been present since the beginning and, not surprisingly, it has always attracted our users’ attention. In fact, the possibility to link an image to the exact device that captured it has a dramatic impact on investigations (e.g., it may help to prove that a child abuse picture was generated by the device found in the suspect’s home).

Continue reading

Bet on the Net! Amped Authenticate Allows Searching for Reference Images on the Web for Better Integrity Analysis

Dear Amped blog fellows, welcome to a brand new Tip Tuesday! When you need to check the integrity of an image, nothing is better than having a reference picture to compare with. Unfortunately, it is common not to have it! That’s why Amped Authenticate lets you search for images from the same device model on the web. Keep reading to find out how!

Continue reading

No Need to Believe: How to Verify the Reliability of Time and Place Information in a Picture Using Amped Authenticate, Your Eyes, and the World Wide Web!

Dear Tip Tuesday friends, welcome! A few weeks ago, we dedicated a Tip to explain why you may find many different datetimes in modern images’ metadata when working with Amped Authenticate, and what those values mean. Today, we’ll focus on how you can cross-check the time information in your image, both working in Authenticate alone, and using external tools on the Internet!

Continue reading

Amped Authenticate Update 13901: Introducing Projects and Report, PRNU with Multiple Reference Cameras, Improved Social Media Identification, and More

The extra-hot summer we’ve had in Italy didn’t stop our dev team! So here we are again this week with another release, this time for Amped Authenticate, maybe just in time for you to try it before your summer holidays!

Projects and Report

We are proud to introduce this widely requested feature: you have now the ability to bookmark results, add comments, organize bookmarks in folders, and finally generate a fully-detailed Report for your case. Below is how Authenticate’s new interface will look like at the end of an image investigation:

Continue reading

Sharing the Smoking Gun: Did You Know Amped Authenticate’s Camera Identification Can Work With Images From Facebook?

Dear Tip Tuesday fans, welcome! This week’s Tip is dedicated to showing the power of the widely loved Amped Authenticate‘s Camera Identification filter. Based on sensor pattern noise analysis, this filter is one of the most reliable and robust in the image forensics field, where “robust” means it may still work even after the image has gone through significant processing. To demonstrate this in practice, we’ll see how the Camera Identification filter often works even on images downloaded from Facebook, which has a dramatic impact in terms of applications.

Continue reading

Need to Process a Lot of Images But Time Is Short? Don’t Worry! Amped Authenticate Runs a Custom Set of Filters Offline and Caches Results For You

Hi, dear Amped blog readers, welcome to this week’s Tip Tuesday! As you surely know, Amped Authenticate is the most complete image authentication suite on the market. It has so many filters… and sometimes they could be too many! Today we’re going to see how you can save time by using Batch Processing and customizing the filter configurations.

Saving time for our users is one of Amped’s main goals. We know that every day you’re dealing with a lot of casework and investigations, so we constantly strive to make our products intuitive to use, fast, and configurable. Unfortunately, there are some things that take time by their nature, and this is especially true for some of Amped Authenticate’s Local Analysis filters. The Clones Blocks, to cite the worst case, can take several minutes to run on a single image, because it has to compute millions of descriptors and match them.

Of course, we don’t like the idea of making you sit in front of the monitor waiting for a filter to complete. That’s why Authenticate features the result caching system: once a filter is computed for an image, the result is stored and will be loaded the next time you click on the filter. This functionality works great when combined with another one, the Batch Processing (available under the Tools menu).

Continue reading